Privilege escalation vulnerabilities exist in Microsoft Windows Graphics Component due to improper handling of objects in memory. An attacker could exploit this vulnerability by logging in to the targeted system and executing specially crafted application. Successful exploitation of this vulnerability could allow an attacker to run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

This vulnerability exist due to improper handling of objects in memory by the windows GDI component. A remote attacker could exploit these vulnerabilities by convincing a user to visit a specially crafted website to disclose sensitive information in memory.

These vulnerabilities exist due to improper handling of objects in memory by the Windows Graphics Device Interface (GDI). A local attacker could exploit these vulnerabilities by convincing a user to run a specially crafted application to disclose sensitive information in memory.Successful exploitation of the vulnerability in combination with another vulnerability could allow an attacker to execute arbitrary code.

These vulnerabilities exist due to improper handling of objects in memory by the Colour Management Module (ICM32.dll). A remote attacker could exploit these vulnerabilities by convincing a user to visit a specially crafted website to disclose sensitive information in memory.

These vulnerabilities exist due to improper handling of memory objects by the Windows Graphics components. A remote attacker could exploit this vulnerability by hosting a website containing a specially crafted file and convincing the targeted user to open it or sending a specially crafted file via email and enticing the targeted user to open it. Successful exploitation of the vulnerability could allow a remote attacker to execute arbitrary code and take complete control of the targeted system.